Re: [Full-Disclosure] In regards to recent crap flooding list.

2003-06-02 Thread Nexus
- Original Message - From: "John Andersen" <[EMAIL PROTECTED]> > I can't believe any rational person would click a link in THIS mailing list > without at first a casual inspection. Believe it mate - personally I think we need more of it as a Darwinian winnowing exercise ;-) Still, even

Re: [Full-Disclosure] In regards to recent crap flooding list.

2003-06-02 Thread John Andersen
On Sunday 01 June 2003 10:23, Perriero, Robert A. wrote: > I'm sick of seeing > links in email messages from this list, clicking them, only to be > redirected to porn pages. I can't believe any rational person would click a link in THIS mailing list without at first a casual inspection. --

Re: [Full-Disclosure] In regards to recent crap flooding list.

2003-06-02 Thread Michael Osten
On Sun, 2003-06-01 at 13:23, Perriero, Robert A. wrote: > To all: > I am by no means a professional security researcher, but it is hard to > find a list where full disclosure is allowed that isn't biased in some > way, either through anal moderators or corporate bias. That said, the > flood of l

Re: [Full-Disclosure] Antigen Path Disclosure

2003-06-02 Thread morning_wood
Because of nothing but assumptions and judgements of me unrelated to the aspects of security... For everones information: 1. I never claimed to be an expert or a professional ( I dont even have an employer ) 2. The .jpg you refer to is and has been publicly available on my site since since the rel

Re: [Full-Disclosure] Antigen Path Disclosure

2003-06-02 Thread em16
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I have problems with trusting the credibility of a security expert who places screenshots of his sub7 chats and exploited hosts on his webpage. As can be see at http://exploit.wox.org/thecore/camscammin.jpg I think it's time for the childish banter

[Full-Disclosure] Yahoo! Audio Conferencing ActiveX control buffer overflow

2003-06-02 Thread Cesar
Security Advisory Name: Yahoo! Audio Conferencing ActiveX control buffer overflow. Systems Affected : Yahoo! Chat, Yahoo! Messanger. Severity : High Remote exploitable : Yes Author:Cesar Cerrudo. Date:06/01/03 Advisory Number:CC060303 Legal Notice: This Advisory is Copyright (c)

[Full-Disclosure] Mod_gzip Debug Mode Vulnerabilities

2003-06-02 Thread Matthew Murphy
Multiple Vulnerabilities in mod_gzip Debugging Routines I. Synopsis Affected Systems: mod_gzip 1.3.26.1a and prior Risk: * Development: High * Production: Minimal Developer URL: http://www.sourceforge.net/projects/mod-gzip Status: Vendor is not supporting project at this time. II. Produc

[Full-Disclosure] In regards to recent crap flooding list.

2003-06-02 Thread Perriero, Robert A.
To all: I am by no means a professional security researcher, but it is hard to find a list where full disclosure is allowed that isn't biased in some way, either through anal moderators or corporate bias. That said, the flood of literal "crap" that I have been getting in my inbox of late from a

Re: [Full-Disclosure] Antigen Path Disclosure

2003-06-02 Thread W1ZARD
> To be honest there is an active campaign from the sub7 and forced control > trojan krews against myself and illwill. Evidenced here > http://xh4z3.net/sh13ld5/fc/news.php and else where. This has been continual > since we would not give camscam to the underground community before working > with t

Re: [Full-Disclosure] Antigen Path Disclosure

2003-06-02 Thread morning_wood
To be honest there is an active campaign from the sub7 and forced control trojan krews against myself and illwill. Evidenced here http://xh4z3.net/sh13ld5/fc/news.php and else where. This has been continual since we would not give camscam to the underground community before working with the compan